Statistics for topic cyber-threat-intelligence
RepositoryStats tracks 613,559 Github repositories, of these 66 are tagged with the cyber-threat-intelligence topic. The most common primary language for repositories using this topic is Python (26).
Stargazers over time for topic cyber-threat-intelligence
Most starred repositories for topic cyber-threat-intelligence (view more)
Trending repositories for topic cyber-threat-intelligence (view more)
A simple application that extracts your IoCs from garbage input and checks their reputation using multiple CTI services.
A FREE Windows C development course where we will learn the Win32API and reverse engineer each step utilizing IDA Free in both an x86 and x64 environment.
A simple application that extracts your IoCs from garbage input and checks their reputation using multiple CTI services.
A FREE Windows C development course where we will learn the Win32API and reverse engineer each step utilizing IDA Free in both an x86 and x64 environment.
A simple application that extracts your IoCs from garbage input and checks their reputation using multiple CTI services.
Attack Flow helps executives, SOC managers, and defenders easily understand how attackers compose ATT&CK techniques into attacks by developing a representation of attack flows, modeling attack flows f...
A FREE Windows C development course where we will learn the Win32API and reverse engineer each step utilizing IDA Free in both an x86 and x64 environment.
An open library of adversary emulation plans designed to empower organizations to test their defenses based on real-world TTPs.
A simple application that extracts your IoCs from garbage input and checks their reputation using multiple CTI services.
Intelligence Vickam Cybersecurity Blocklists (IPv4). DST = France & Belgium
Attack Flow helps executives, SOC managers, and defenders easily understand how attackers compose ATT&CK techniques into attacks by developing a representation of attack flows, modeling attack flows f...
A simple application that extracts your IoCs from garbage input and checks their reputation using multiple CTI services.
An open library of adversary emulation plans designed to empower organizations to test their defenses based on real-world TTPs.
Raw data from Threat Intelligence Reports with automatic reports collection and keyword search across thousands of reports
Web app that provides basic navigation and annotation of ATT&CK matrices
A simple application that extracts your IoCs from garbage input and checks their reputation using multiple CTI services.
Raw data from Threat Intelligence Reports with automatic reports collection and keyword search across thousands of reports
Extracts IoCs, TTPs and the relationships between them. Outputs a STIX 2.1 bundle.
To be used with tools like GoBuster & DirBuster but these lists are specifically tailored and designed for scanning phishing <>< landing pages and other malicious or sketch af financial/crypto fraud w...
This comprehensive and central repository is designed for cybersecurity enthusiasts, researchers, and professionals seeking to stay ahead in the field. It provides a valuable resource for those dedica...
A simple application that extracts your IoCs from garbage input and checks their reputation using multiple CTI services.
Raw data from Threat Intelligence Reports with automatic reports collection and keyword search across thousands of reports
Extracts IoCs, TTPs and the relationships between them. Outputs a STIX 2.1 bundle.
This Repository is a collection of different ethical hacking tools and malware's for penetration testing and research purpose written in python, ruby, rust, c++, go and c.
An open library of adversary emulation plans designed to empower organizations to test their defenses based on real-world TTPs.
A simple application that extracts your IoCs from garbage input and checks their reputation using multiple CTI services.
Web app that provides basic navigation and annotation of ATT&CK matrices
This Repository is a collection of different ethical hacking tools and malware's for penetration testing and research purpose written in python, ruby, rust, c++, go and c.
Modular web-application honeypot platform built using go and gin
Pythia is a versatile query format designed to facilitate the discovery of malicious infrastructure by seamlessly converting into the syntax of popular search engines.
Secutils.dev is an open-source, versatile, yet simple security toolbox for engineers and researchers